Infosecurity News

North Korea's Lazarus Group Suspected of $100m Harmony Hack
Elliptic used Tornado demixing techniques to trace the stolen funds to new Ethereum wallets

DragonForce Malaysia Group Releases Windows LPE Exploit and Turns to Ransomware Tactics
The primary objective of the attack was reportedly to get back at the Indian Government

Info-Stealing Campaign Targeted Home Workers for Two Years
ZuoRAT used in operation focused on SOHO routers

Nevadan Arrested for Alleged $45m Metaverse Investment Fraud
Scheme allegedly targeted over 10,000 victims

Ukrainian Cops Bust Multimillion-Dollar Phishing Gang
Thousands scammed by spoofed EU portals

Cybersecurity Researchers Launch New Malware Hunting Tool YARAify
The defensive tool is designed to scan suspicious files against a large repository of YARA rules

New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack
Successful exploitation would give an attacker access to all emails on a compromised server

Amazon Fixes High Severity Vulnerability in Amazon Photos Android App
The vulnerability derived from a misconfiguration of one of the Photos app’s components

Chinese Influence Op Tries to Undermine Western Rare Earth Firms
Micro-targeting of local users a first for Beijing

FBI: Beware Deepfakes Used to Apply for Remote Jobs
Feds warn of fraudulent attempts to land work

Ransomware Suspected in Wiltshire Farm Foods Attack
Food manufacturer reveals system outage

Nearly One Million Exposed Misconfigured Kubernetes Instances Could Cause Breaches
Misconfiguration practices might make companies lucrative targets for threat actors

Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia
Telecommunications companies in Pakistan and Afghanistan and a port in Malaysia targeted

Android Spyware 'Revive' Upgraded to Banking Trojan
Dubbed ‘Revive’ because of its ability to automatically restart in case it stops working, the tool seems to be designed for persistent campaigns.

Clear Rules Needed to Prevent Conflict and Struggle in Cyber Space, Says NCSC Chief
NCSC chief executive Lindy Cameron explains that clear rules are needed to govern the use of cyber capabilities

97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors
The EY Quantum Readiness Survey 2022 contains the responses of 501 executive-level business leaders

Stress and Burnout Could Lead to Exodus of CNI Cybersecurity Leaders
95% of cybersecurity leaders are experiencing factors that would make them likely to leave their role in the next 12 months

Unknown Hacker Steals $100m From California-Based Cryptocurrency Firm Harmony
Harmony reassured customers the rest of funds held on its blockchain were safe

Pro-Russian Hacker Group Killnet Hits Critical Government Websites in Lithuania
The hacking group demanded Lithuania allow transit of goods to Kaliningrad

Chinese Researchers Find Critical Security Flaws in CoDeSys Automation Software
Vulnerabilities could allow attackers to gain unauthorized access to company resources or carry out denial-of-service attacks



